An authentication scheme with identity-based cryptography for M2M security in cyber-physical systems.
Shuo ChenMaode MaZhenxing LuoPublished in: Secur. Commun. Networks (2016)
Keyphrases
- identity based cryptography
- authentication scheme
- key management
- cyber physical systems
- secret key
- digital signature
- smart card
- ad hoc networks
- wireless sensor networks
- resource constrained
- public key
- cyber security
- key distribution
- secure communication
- security protocols
- bilinear pairings
- physical world
- security services
- secret sharing scheme
- user authentication
- authentication protocol
- provably secure
- real time
- sensor networks
- diffie hellman
- signcryption scheme
- lightweight